Analysis
-
max time kernel
42s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe
Resource
win10v2004-20240508-en
General
-
Target
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe
-
Size
12.7MB
-
MD5
4c96923cf4a650d27e5f95c2ee78c6ee
-
SHA1
934641ca1dcf17829426b0cfb46de083425ad8a3
-
SHA256
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4
-
SHA512
8e458df1972d7d4add15c663ea7e95bb5d8ad37830f3a8067417b904b14d121e9ed2b0d7701b97f0468bc6935b5ba6762bbe7e2f532cc9558543566983c1717f
-
SSDEEP
196608:u07lhv4+zaZK4DT81o3LAKmP0R/7pS2E5RV9BYb3mnSdK/zvwpyFl1v6psjLm:x7zxzaZKt1o3IP0RsLRVk4fFl1v6pQ
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ascaris.dll acprotect -
Executes dropped EXE 2 IoCs
Processes:
drawerror.exeGhost.exepid process 3032 drawerror.exe 2640 Ghost.exe -
Loads dropped DLL 1 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exepid process 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "c:\\cc.ico" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\ascaris.dll upx behavioral1/memory/2844-48-0x0000000010000000-0x00000000100B3000-memory.dmp upx behavioral1/memory/2844-60-0x0000000010000000-0x00000000100B3000-memory.dmp upx behavioral1/memory/2844-70-0x0000000010000000-0x00000000100B3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\i: cmd.exe File opened (read-only) \??\l: cmd.exe File opened (read-only) \??\q: cmd.exe File opened (read-only) \??\s: cmd.exe File opened (read-only) \??\w: cmd.exe File opened (read-only) \??\g: cmd.exe File opened (read-only) \??\o: cmd.exe File opened (read-only) \??\t: cmd.exe File opened (read-only) \??\u: cmd.exe File opened (read-only) \??\v: cmd.exe File opened (read-only) \??\y: cmd.exe File opened (read-only) \??\e: cmd.exe File opened (read-only) \??\k: cmd.exe File opened (read-only) \??\n: cmd.exe File opened (read-only) \??\p: cmd.exe File opened (read-only) \??\r: cmd.exe File opened (read-only) \??\x: cmd.exe File opened (read-only) \??\z: cmd.exe File opened (read-only) \??\j: cmd.exe File opened (read-only) \??\m: cmd.exe File opened (read-only) \??\h: cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\Wallpaper = "1.bmp" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Kills process with taskkill 16 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2436 taskkill.exe 8656 taskkill.exe 7848 taskkill.exe 9480 taskkill.exe 9852 taskkill.exe 10116 taskkill.exe 10176 taskkill.exe 2268 taskkill.exe 9788 taskkill.exe 10052 taskkill.exe 9728 taskkill.exe 9916 taskkill.exe 10236 taskkill.exe 8656 taskkill.exe 9576 taskkill.exe 9988 taskkill.exe -
Modifies Control Panel 2 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\WallpaperStyle = "2" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\Desktop\TileWallpaper = "2" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Modifies registry class 64 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dat cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ppt\ = "txtfile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmv cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jpg\ = "txtfile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.3gp cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jpeg\ = "txtfile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\DefaultIcon\ = "c:\\cc.ico" dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.exe cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.exe\ = "exefile" cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exepid process 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2436 taskkill.exe Token: SeDebugPrivilege 8656 taskkill.exe Token: SeDebugPrivilege 7848 taskkill.exe Token: SeDebugPrivilege 9480 taskkill.exe Token: SeDebugPrivilege 9576 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Ghost.exepid process 2640 Ghost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exeGhost.exepid process 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe 2640 Ghost.exe 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.execmd.execmd.execmd.exedescription pid process target process PID 2844 wrote to memory of 3032 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe drawerror.exe PID 2844 wrote to memory of 3032 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe drawerror.exe PID 2844 wrote to memory of 3032 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe drawerror.exe PID 2844 wrote to memory of 3032 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe drawerror.exe PID 2844 wrote to memory of 2640 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe Ghost.exe PID 2844 wrote to memory of 2640 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe Ghost.exe PID 2844 wrote to memory of 2640 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe Ghost.exe PID 2844 wrote to memory of 2640 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe Ghost.exe PID 2844 wrote to memory of 1264 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe cmd.exe PID 2844 wrote to memory of 1264 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe cmd.exe PID 2844 wrote to memory of 1264 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe cmd.exe PID 2844 wrote to memory of 1264 2844 dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe cmd.exe PID 1264 wrote to memory of 2476 1264 cmd.exe cmd.exe PID 1264 wrote to memory of 2476 1264 cmd.exe cmd.exe PID 1264 wrote to memory of 2476 1264 cmd.exe cmd.exe PID 1264 wrote to memory of 2476 1264 cmd.exe cmd.exe PID 2476 wrote to memory of 2236 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2236 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2236 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2236 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2700 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2700 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2700 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2700 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2548 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2548 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2548 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2548 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2668 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2668 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2668 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2668 2476 cmd.exe cmd.exe PID 1264 wrote to memory of 2436 1264 cmd.exe taskkill.exe PID 1264 wrote to memory of 2436 1264 cmd.exe taskkill.exe PID 1264 wrote to memory of 2436 1264 cmd.exe taskkill.exe PID 1264 wrote to memory of 2436 1264 cmd.exe taskkill.exe PID 2476 wrote to memory of 2504 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2504 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2504 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2504 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 756 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 756 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 756 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 756 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2932 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2932 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2932 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2932 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 1732 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 1732 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 1732 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 1732 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 108 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 108 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 108 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 108 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2772 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2772 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2772 2476 cmd.exe cmd.exe PID 2476 wrote to memory of 2772 2476 cmd.exe cmd.exe PID 2236 wrote to memory of 2780 2236 cmd.exe cmd.exe PID 2236 wrote to memory of 2780 2236 cmd.exe cmd.exe PID 2236 wrote to memory of 2780 2236 cmd.exe cmd.exe PID 2236 wrote to memory of 2780 2236 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe"C:\Users\Admin\AppData\Local\Temp\dc78949369ee4a27212536bec9e9cc12f80f27c8395b12f311e4f4b20b5f38a4.exe"1⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\drawerror.exec:\drawerror.exe2⤵
- Executes dropped EXE
-
\??\c:\Ghost.exec:\Ghost.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd /c c:\ÓðÒí.bat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\1.bat4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 360tray.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg add3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v nodrives /t REG_DWORD /d 60 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoRun /t REG_DWORD /d 0 /f3⤵
-
C:\Windows\SysWOW64\subst.exesubst b: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst h: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst i: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst j: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst l: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst m: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst n: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst o: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst r: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst t: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst k: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst p: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst q: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst s: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst u: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst v: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst w: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst x: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst y: C:\3⤵
-
C:\Windows\SysWOW64\subst.exesubst z: C:\3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im explorer.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoClose /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v HideClock /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v StartMenuLogOff /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoWindowsUpdate /t REG_DWORD /d 01000000 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoDesktop /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoViewContextMenu /t REG_DWORD /d 0 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARW\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoWinKeys /t REG_DWORD /d 1 /f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c c:\1.bat2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c c:\±øÍÅ.bat2⤵
- Enumerates connected drives
-
C:\Windows\SysWOW64\cmd.execmd /c c:\ascaris.bat2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im 360tray.exe2⤵
- Kills process with taskkill
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Event Triggered Execution
1Change Default File Association
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\1.batFilesize
28B
MD5ccff006fd8c4150a18669ced52244d6a
SHA1743fe1b7fe0a8215fbb5eeeb95e55ba4f39cb01e
SHA2563c32ecce41201efa27dd4e18d5d0b88c429fc9427829f565512e44b487ce120e
SHA512114e98ad958e4cbdad94d24753c2a67a1080160c4fa35d9839420aa5de9f28446794c606b29d58f342f7316421ecfb877741957cd979736ea9fcfae06981bf79
-
C:\1.batFilesize
18B
MD5c6c7b4dcc81c27c76c49dfd2acee715e
SHA1ef6a2a2ccb276bc9a057cd0d6f0bd3867d1988b7
SHA256edc099fdfa8210f123cdc51dfb3256cc7dc3c0af614fd63e3c1d6182bf37ae21
SHA512b9d1aba58a20238e3870c9785a43d1c64273b3c332d545f8c363d02844214f6dcd3332c35281b2663ed2192728c33d915d457615c6f4057a1dccdea188d38898
-
C:\Ghost.exeFilesize
20KB
MD569c97e6fcc20eda26024caedc87449f3
SHA11d784041e60c83b6b5bd1a644a5daff8d7ddb627
SHA256a70f454dd1b123be4dda9ee8e22e3a5f414397b8a7ce221647d2e12f9244146a
SHA512de7f603f33ac35ceb1ef769e9a349f3887be451af1d7ea71996496db9584f820c483ae4c6db672b2b47b2c9330effe2cffac6a30aafe9396edb78fb680f776ec
-
C:\Windows\System32\drivers\etc\hostsFilesize
840B
MD5cc86e1a5224fcaa035e618fa766d5b53
SHA109913248e3983ee751bddca919599e9f5a07685a
SHA2561aaf0d85389d6359d30f2d0f0942f8e1369871e75350f4fbcf1edd79836d9926
SHA512177ecec47415e30c91e46576f472b9371818c73964b02c275a3e8f525fc5f6436d911cbb36ee72de15907f8e9b4c2bc2b5bbe662f44762ecec1120a99a2eef3b
-
C:\ascaris.batFilesize
13KB
MD554552eebfc4c487d01daa63048efa72c
SHA17f0ef347eeae3b26efb3c24a83d03958cb7fa3ab
SHA256b085349f14e199ee7344ae9120898da281b6d410d6b595dffddb55f3645a251f
SHA512a1dc49c221da7ebe12229807664b164bc99bff4fa918cfd31a818ce779566b9e8d7eef22355b187dfa8d064d4ed92d164465a604ef79c824065a7e5e60669b23
-
C:\drawerror.exeFilesize
9KB
MD5a4b655c4580fad879c431ac265bd1409
SHA1f98d37a7c2a5a24f7d6871c87d150de4417e00ad
SHA2562eba41b0399d91c5677f9ead8beb2610f94026a6a91c84ff7a4f19cfafbe61ad
SHA512af7124caef5babde34421550f1aef4c74b88ddd657c3eaf4af5887a61b6b8c31b09b199886cab92a87eb089502f049c11da266c900de02c8310058b4c704e854
-
C:\±øÍÅ.batFilesize
166B
MD532f678c01c8d5edca7ecaf35937259f6
SHA17079515682536cf2366bcdf0f44a8ce83a17c806
SHA25680552c862831e82ffa22045b26efeef84e89576f0ab385b5b87d8467d98b9e94
SHA5122833b2fd557b51505d8a2a251b664e51944c1a5e65109b76719d6ac970c3058159460b3d9205ab98ce65c32c066d52f1320fc79170c2b06a02c5ecbecaadcc7a
-
C:\ÓðÒí.batFilesize
2KB
MD58f0b90a560cc05a8fe5068d4db3087bd
SHA11d53e5256d162964cf38cf1d73ae6db8a633ea6d
SHA2566db71de3499a83a9602d693e99d36127772c743b595e26f36c69cba2e2186f2e
SHA512df375eac9903fbe5675806f078e0faf0bb7342737ee34359edd3e55866ce5ecd27b09c5e8fff06e1463fe2ebb18bfbf93ce19adbcee986effa1dcbcd34a602a6
-
\Users\Admin\AppData\Local\Temp\ascaris.dllFilesize
224KB
MD54520eee1da294b6c8428cea200b81d18
SHA12d1478c5aef0934db397b8c593ec2432d9809b83
SHA2569b2c140b6c47666024128b8ac9f1e8b2fe041caf6d286eec638018beb48394cd
SHA512aff152ec0672597c483d15fe04fe7ddf55155827a2df588ab83efc45301cedb670be23a566ee8c268e497d33e21b48ee8723ad812d253f9d1f284e3324734ac0
-
memory/2844-48-0x0000000010000000-0x00000000100B3000-memory.dmpFilesize
716KB
-
memory/2844-0-0x0000000000400000-0x00000000010CA000-memory.dmpFilesize
12.8MB
-
memory/2844-60-0x0000000010000000-0x00000000100B3000-memory.dmpFilesize
716KB
-
memory/2844-70-0x0000000010000000-0x00000000100B3000-memory.dmpFilesize
716KB
-
memory/3032-35-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB